☀️ JOIN SPN MOBILE
Forums
New posts
Guru Granth Sahib
Composition, Arrangement & Layout
ਜਪੁ | Jup
ਸੋ ਦਰੁ | So Dar
ਸੋਹਿਲਾ | Sohilaa
ਰਾਗੁ ਸਿਰੀਰਾਗੁ | Raag Siree-Raag
Gurbani (14-53)
Ashtpadiyan (53-71)
Gurbani (71-74)
Pahre (74-78)
Chhant (78-81)
Vanjara (81-82)
Vaar Siri Raag (83-91)
Bhagat Bani (91-93)
ਰਾਗੁ ਮਾਝ | Raag Maajh
Gurbani (94-109)
Ashtpadi (109)
Ashtpadiyan (110-129)
Ashtpadi (129-130)
Ashtpadiyan (130-133)
Bara Maha (133-136)
Din Raen (136-137)
Vaar Maajh Ki (137-150)
ਰਾਗੁ ਗਉੜੀ | Raag Gauree
Gurbani (151-185)
Quartets/Couplets (185-220)
Ashtpadiyan (220-234)
Karhalei (234-235)
Ashtpadiyan (235-242)
Chhant (242-249)
Baavan Akhari (250-262)
Sukhmani (262-296)
Thittee (296-300)
Gauree kii Vaar (300-323)
Gurbani (323-330)
Ashtpadiyan (330-340)
Baavan Akhari (340-343)
Thintteen (343-344)
Vaar Kabir (344-345)
Bhagat Bani (345-346)
ਰਾਗੁ ਆਸਾ | Raag Aasaa
Gurbani (347-348)
Chaupaday (348-364)
Panchpadde (364-365)
Kaafee (365-409)
Aasaavaree (409-411)
Ashtpadiyan (411-432)
Patee (432-435)
Chhant (435-462)
Vaar Aasaa (462-475)
Bhagat Bani (475-488)
ਰਾਗੁ ਗੂਜਰੀ | Raag Goojaree
Gurbani (489-503)
Ashtpadiyan (503-508)
Vaar Gujari (508-517)
Vaar Gujari (517-526)
ਰਾਗੁ ਦੇਵਗੰਧਾਰੀ | Raag Dayv-Gandhaaree
Gurbani (527-536)
ਰਾਗੁ ਬਿਹਾਗੜਾ | Raag Bihaagraa
Gurbani (537-556)
Chhant (538-548)
Vaar Bihaagraa (548-556)
ਰਾਗੁ ਵਡਹੰਸ | Raag Wadhans
Gurbani (557-564)
Ashtpadiyan (564-565)
Chhant (565-575)
Ghoriaan (575-578)
Alaahaniiaa (578-582)
Vaar Wadhans (582-594)
ਰਾਗੁ ਸੋਰਠਿ | Raag Sorath
Gurbani (595-634)
Asatpadhiya (634-642)
Vaar Sorath (642-659)
ਰਾਗੁ ਧਨਾਸਰੀ | Raag Dhanasaree
Gurbani (660-685)
Astpadhiya (685-687)
Chhant (687-691)
Bhagat Bani (691-695)
ਰਾਗੁ ਜੈਤਸਰੀ | Raag Jaitsree
Gurbani (696-703)
Chhant (703-705)
Vaar Jaitsaree (705-710)
Bhagat Bani (710)
ਰਾਗੁ ਟੋਡੀ | Raag Todee
ਰਾਗੁ ਬੈਰਾੜੀ | Raag Bairaaree
ਰਾਗੁ ਤਿਲੰਗ | Raag Tilang
Gurbani (721-727)
Bhagat Bani (727)
ਰਾਗੁ ਸੂਹੀ | Raag Suhi
Gurbani (728-750)
Ashtpadiyan (750-761)
Kaafee (761-762)
Suchajee (762)
Gunvantee (763)
Chhant (763-785)
Vaar Soohee (785-792)
Bhagat Bani (792-794)
ਰਾਗੁ ਬਿਲਾਵਲੁ | Raag Bilaaval
Gurbani (795-831)
Ashtpadiyan (831-838)
Thitteen (838-840)
Vaar Sat (841-843)
Chhant (843-848)
Vaar Bilaaval (849-855)
Bhagat Bani (855-858)
ਰਾਗੁ ਗੋਂਡ | Raag Gond
Gurbani (859-869)
Ashtpadiyan (869)
Bhagat Bani (870-875)
ਰਾਗੁ ਰਾਮਕਲੀ | Raag Ramkalee
Ashtpadiyan (902-916)
Gurbani (876-902)
Anand (917-922)
Sadd (923-924)
Chhant (924-929)
Dakhnee (929-938)
Sidh Gosat (938-946)
Vaar Ramkalee (947-968)
ਰਾਗੁ ਨਟ ਨਾਰਾਇਨ | Raag Nat Narayan
Gurbani (975-980)
Ashtpadiyan (980-983)
ਰਾਗੁ ਮਾਲੀ ਗਉੜਾ | Raag Maalee Gauraa
Gurbani (984-988)
Bhagat Bani (988)
ਰਾਗੁ ਮਾਰੂ | Raag Maaroo
Gurbani (889-1008)
Ashtpadiyan (1008-1014)
Kaafee (1014-1016)
Ashtpadiyan (1016-1019)
Anjulian (1019-1020)
Solhe (1020-1033)
Dakhni (1033-1043)
ਰਾਗੁ ਤੁਖਾਰੀ | Raag Tukhaari
Bara Maha (1107-1110)
Chhant (1110-1117)
ਰਾਗੁ ਕੇਦਾਰਾ | Raag Kedara
Gurbani (1118-1123)
Bhagat Bani (1123-1124)
ਰਾਗੁ ਭੈਰਉ | Raag Bhairo
Gurbani (1125-1152)
Partaal (1153)
Ashtpadiyan (1153-1167)
ਰਾਗੁ ਬਸੰਤੁ | Raag Basant
Gurbani (1168-1187)
Ashtpadiyan (1187-1193)
Vaar Basant (1193-1196)
ਰਾਗੁ ਸਾਰਗ | Raag Saarag
Gurbani (1197-1200)
Partaal (1200-1231)
Ashtpadiyan (1232-1236)
Chhant (1236-1237)
Vaar Saarang (1237-1253)
ਰਾਗੁ ਮਲਾਰ | Raag Malaar
Gurbani (1254-1293)
Partaal (1265-1273)
Ashtpadiyan (1273-1278)
Chhant (1278)
Vaar Malaar (1278-91)
Bhagat Bani (1292-93)
ਰਾਗੁ ਕਾਨੜਾ | Raag Kaanraa
Gurbani (1294-96)
Partaal (1296-1318)
Ashtpadiyan (1308-1312)
Chhant (1312)
Vaar Kaanraa
Bhagat Bani (1318)
ਰਾਗੁ ਕਲਿਆਨ | Raag Kalyaan
Gurbani (1319-23)
Ashtpadiyan (1323-26)
ਰਾਗੁ ਪ੍ਰਭਾਤੀ | Raag Prabhaatee
Gurbani (1327-1341)
Ashtpadiyan (1342-51)
ਰਾਗੁ ਜੈਜਾਵੰਤੀ | Raag Jaijaiwanti
Gurbani (1352-53)
Salok | Gatha | Phunahe | Chaubole | Swayiye
Sehskritee Mahala 1
Sehskritee Mahala 5
Gaathaa Mahala 5
Phunhay Mahala 5
Chaubolae Mahala 5
Shaloks Bhagat Kabir
Shaloks Sheikh Farid
Swaiyyae Mahala 5
Swaiyyae in Praise of Gurus
Shaloks in Addition To Vaars
Shalok Ninth Mehl
Mundavanee Mehl 5
ਰਾਗ ਮਾਲਾ, Raag Maalaa
What's new
New posts
New media
New media comments
New resources
Latest activity
Videos
New media
New comments
Library
Latest reviews
Donate
Log in
Register
What's new
New posts
Menu
Log in
Register
Install the app
Install
Welcome to all New Sikh Philosophy Network Forums!
Explore Sikh Sikhi Sikhism...
Sign up
Log in
Discussions
Hard Talk
Interviews
New Documents Reveal Parameters Of NSA’s Secret Surveillance Programs
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="spnadmin" data-source="post: 186437" data-attributes="member: 35"><p>New documents reveal parameters of NSA’s secret surveillance programs</p><p></p><p>By Ellen Nakashima, Barton Gellman and Greg Miller</p><p></p><p><a href="http://www.washingtonpost.com/world/national-security/new-documents-reveal-parameters-of-nsas-secret-surveillance-programs/2013/06/20/54248600-d9f7-11e2-a9f2-42ee3912ae0e_story_1.html" target="_blank">http://www.washingtonpost.com/world/national-security/new-documents-reveal-parameters-of-nsas-secret-surveillance-programs/2013/06/20/54248600-d9f7-11e2-a9f2-42ee3912ae0e_story_1.html</a></p><p></p><p>The National Security Agency may keep the e-mails and telephone calls of citizens and legal residents if the communications contain “significant foreign intelligence” or evidence of a crime, according to classified documents that lay out procedures for targeting foreigners and for guarding Americans’ privacy.</p><p></p><p>Newly disclosed documents describe a series of steps the world’s largest spy agency is supposed to take to keep Americans from being caught in its massive surveillance net. They suggest that the NSA has latitude to keep and use citizens’ communications under certain conditions.</p><p></p><p>President Obama said the National Security Agency’s email collecting program “does not apply to U.S. citizens and...people living in the United States.”</p><p></p><p>The papers, made available to The Washington Post and Britain’s Guardian newspaper, are the first public written documentation of procedures governing a far-reaching NSA surveillance program authorized by Congress in 2008 to gather the e-mails and phone calls of targets who are supposed to be foreigners located overseas.</p><p></p><p>In recent days, the Obama administration has defended the program as critical to national security, saying it has helped foil more than 50 terrorist plots in the United States and abroad.</p><p></p><p>President Obama said after the disclosures that NSA domestic activities “do not involve listening to people’s phone calls, do not involve reading the e-mails of U.S. citizens or U.S. residents, absent further action by a federal court, that is entirely consistent with what we would do, for example, in a criminal investigation.”</p><p></p><p>The new documents show that the NSA collects, processes, retains and disseminates the contents of Americans’ phone calls and e-mails under a wide range of circumstances.</p><p></p><p>NSA Director Keith B. Alexander described the program as “limited, focused and subject to rigorous oversight.” Testifying before Congress, he said “the disciplined operation” of this and a related surveillance program “protects the privacy and civil liberties of the American people.”</p><p></p><p>A spokesman for the Office of the Director of National Intelligence declined to comment on the documents Thursday.</p><p></p><p>Privacy advocates expressed concern about what they viewed as rules that leave much wiggle room for NSA analysts to monitor Americans’ communications.</p><p></p><p>“These documents confirm what we have feared all along, that the NSA believes it can collect Americans’ international communications with little, if any, restriction,” said Alex Abdo, a staff lawyer with the American Civil Liberties Union. “Its procedures allow it to target for surveillance essentially any foreigner located abroad — whether or not they’re suspected of any wrongdoing, let alone terrorism.”</p><p></p><p>Administration officials say the surveillance program does not target Americans anywhere without a warrant. Still, said Gregory Nojeim, senior counsel for the Center for Democracy and Technology, “there’s a lot of leeway to use ‘inadvertently’ acquired domestic communications,” for instance, for criminal inquiries.</p><p></p><p>And the rules show that the communications of lawyers and their clients may be retained if they contain foreign intelligence information, although dissemination must be approved by the NSA general counsel.</p><p></p><p>Congress authorized the collection program amid a great debate about the degree to which the government was expanding its surveillance authority without sufficient protection for Americans’ privacy.</p><p></p><p>Authorized by Section 702 of the amended Foreign Intelligence Surveillance Act (FISA), the program did away with the traditional individual warrant for each foreign suspect whose communications would be collected in the United States. In its place, the FISA court, which oversees domestic surveillance for foreign intelligence purposes and whose proceedings are secret, would certify the government’s procedures to target people overseas and ensure citizens’ </p><p></p><p>Classified documents spell out procedures for targeting foreigners and minimizing the collection of data from U.S. persons.</p><p></p><p>President Obama said the National Security Agency’s email collecting program “does not apply to U.S. citizens and...people living in the United States.”</p><p></p><p>President Obama said the National Security Agency’s email collecting program “does not apply to U.S. citizens and...people living in the United States.”</p><p></p><p>It issues a certificate, good for one year, that allows the NSA to order a U.S. Internet or phone company to turn over over e-mails, phone calls and other communications related to a series of foreign targets, none of which the court approved individually.</p><p></p><p>“What’s most striking about the targeting procedures is the discretion they confer on the NSA,” said Elizabeth Goitein, co-director of the Brennan Center for Justice’s Liberty and National Security program.</p><p></p><p>In figuring out whether a target is “reasonably believed” to be located overseas, for example, the agency looks at the “totality of the circumstances” relating to a person’s location. In the absence of that specific information, “a person reasonably believed to be located outside the United States or whose location is not known will be presumed to be a non-United States person,” according to rules on the targeting of suspects.</p><p></p><p>Nonetheless, the documents contain a series of steps the NSA may take to determine a foreigner’s location. Agency analysts examine leads that may come from other agencies, including from human sources. They conduct research in NSA databases, scrutinize Internet protocol addresses and target “Internet links that terminate in a foreign country.”</p><p></p><p>“When NSA proposes to direct surveillance at a target, it does so because NSA has already learned something about the target,” according to the targeting rules. Often, that lead comes from the CIA or a law enforcement agency.</p><p></p><p>The NSA uses whatever details are contained in that lead to make an initial assessment of whether it is being asked to eavesdrop on an overseas target. But the agency then takes other steps depending on the circumstances, such as scanning databases “to which NSA has access but did not originate” for clues about location.</p><p></p><p>To prevent U.S. citizens and legal residents from being targeted, NSA keeps a database of phone numbers and e-mail addresses associated with people thought to be living in the country. New requests are compared to records on the list. Matches are signals to put the surveillance on hold.</p><p></p><p>The NSA then goes through a sequence of potential additional checks, according to the document. It may look at area codes and the ordinary data packets that accompany e-mails as they cross the Internet. And it may check contact lists associated with e-mail accounts, as well as massive “knowledge databases” that contain CIA intelligence reports.</p><p></p><p>After it begins intercepting calls or e-mails, the NSA is supposed to continue to look for signs that the person it is monitoring has entered the United States, which would prompt a halt in surveillance and possibly a notification to the FBI.</p><p></p><p>The document on “minimization” spells out rules for protecting privacy, some of which have been described publicly. The rules protect not just citizens, but foreigners in the United States.</p><p></p><p>If domestic communications lack significant foreign intelligence information, they must be promptly destroyed. Communications concerning Americans may not be kept more than five years.</p><p></p><p>If a target who was outside the United States enters the country, the monitoring must stop immediately.</p></blockquote><p></p>
[QUOTE="spnadmin, post: 186437, member: 35"] New documents reveal parameters of NSA’s secret surveillance programs By Ellen Nakashima, Barton Gellman and Greg Miller [url]http://www.washingtonpost.com/world/national-security/new-documents-reveal-parameters-of-nsas-secret-surveillance-programs/2013/06/20/54248600-d9f7-11e2-a9f2-42ee3912ae0e_story_1.html[/url] The National Security Agency may keep the e-mails and telephone calls of citizens and legal residents if the communications contain “significant foreign intelligence” or evidence of a crime, according to classified documents that lay out procedures for targeting foreigners and for guarding Americans’ privacy. Newly disclosed documents describe a series of steps the world’s largest spy agency is supposed to take to keep Americans from being caught in its massive surveillance net. They suggest that the NSA has latitude to keep and use citizens’ communications under certain conditions. President Obama said the National Security Agency’s email collecting program “does not apply to U.S. citizens and...people living in the United States.” The papers, made available to The Washington Post and Britain’s Guardian newspaper, are the first public written documentation of procedures governing a far-reaching NSA surveillance program authorized by Congress in 2008 to gather the e-mails and phone calls of targets who are supposed to be foreigners located overseas. In recent days, the Obama administration has defended the program as critical to national security, saying it has helped foil more than 50 terrorist plots in the United States and abroad. President Obama said after the disclosures that NSA domestic activities “do not involve listening to people’s phone calls, do not involve reading the e-mails of U.S. citizens or U.S. residents, absent further action by a federal court, that is entirely consistent with what we would do, for example, in a criminal investigation.” The new documents show that the NSA collects, processes, retains and disseminates the contents of Americans’ phone calls and e-mails under a wide range of circumstances. NSA Director Keith B. Alexander described the program as “limited, focused and subject to rigorous oversight.” Testifying before Congress, he said “the disciplined operation” of this and a related surveillance program “protects the privacy and civil liberties of the American people.” A spokesman for the Office of the Director of National Intelligence declined to comment on the documents Thursday. Privacy advocates expressed concern about what they viewed as rules that leave much wiggle room for NSA analysts to monitor Americans’ communications. “These documents confirm what we have feared all along, that the NSA believes it can collect Americans’ international communications with little, if any, restriction,” said Alex Abdo, a staff lawyer with the American Civil Liberties Union. “Its procedures allow it to target for surveillance essentially any foreigner located abroad — whether or not they’re suspected of any wrongdoing, let alone terrorism.” Administration officials say the surveillance program does not target Americans anywhere without a warrant. Still, said Gregory Nojeim, senior counsel for the Center for Democracy and Technology, “there’s a lot of leeway to use ‘inadvertently’ acquired domestic communications,” for instance, for criminal inquiries. And the rules show that the communications of lawyers and their clients may be retained if they contain foreign intelligence information, although dissemination must be approved by the NSA general counsel. Congress authorized the collection program amid a great debate about the degree to which the government was expanding its surveillance authority without sufficient protection for Americans’ privacy. Authorized by Section 702 of the amended Foreign Intelligence Surveillance Act (FISA), the program did away with the traditional individual warrant for each foreign suspect whose communications would be collected in the United States. In its place, the FISA court, which oversees domestic surveillance for foreign intelligence purposes and whose proceedings are secret, would certify the government’s procedures to target people overseas and ensure citizens’ Classified documents spell out procedures for targeting foreigners and minimizing the collection of data from U.S. persons. President Obama said the National Security Agency’s email collecting program “does not apply to U.S. citizens and...people living in the United States.” President Obama said the National Security Agency’s email collecting program “does not apply to U.S. citizens and...people living in the United States.” It issues a certificate, good for one year, that allows the NSA to order a U.S. Internet or phone company to turn over over e-mails, phone calls and other communications related to a series of foreign targets, none of which the court approved individually. “What’s most striking about the targeting procedures is the discretion they confer on the NSA,” said Elizabeth Goitein, co-director of the Brennan Center for Justice’s Liberty and National Security program. In figuring out whether a target is “reasonably believed” to be located overseas, for example, the agency looks at the “totality of the circumstances” relating to a person’s location. In the absence of that specific information, “a person reasonably believed to be located outside the United States or whose location is not known will be presumed to be a non-United States person,” according to rules on the targeting of suspects. Nonetheless, the documents contain a series of steps the NSA may take to determine a foreigner’s location. Agency analysts examine leads that may come from other agencies, including from human sources. They conduct research in NSA databases, scrutinize Internet protocol addresses and target “Internet links that terminate in a foreign country.” “When NSA proposes to direct surveillance at a target, it does so because NSA has already learned something about the target,” according to the targeting rules. Often, that lead comes from the CIA or a law enforcement agency. The NSA uses whatever details are contained in that lead to make an initial assessment of whether it is being asked to eavesdrop on an overseas target. But the agency then takes other steps depending on the circumstances, such as scanning databases “to which NSA has access but did not originate” for clues about location. To prevent U.S. citizens and legal residents from being targeted, NSA keeps a database of phone numbers and e-mail addresses associated with people thought to be living in the country. New requests are compared to records on the list. Matches are signals to put the surveillance on hold. The NSA then goes through a sequence of potential additional checks, according to the document. It may look at area codes and the ordinary data packets that accompany e-mails as they cross the Internet. And it may check contact lists associated with e-mail accounts, as well as massive “knowledge databases” that contain CIA intelligence reports. After it begins intercepting calls or e-mails, the NSA is supposed to continue to look for signs that the person it is monitoring has entered the United States, which would prompt a halt in surveillance and possibly a notification to the FBI. The document on “minimization” spells out rules for protecting privacy, some of which have been described publicly. The rules protect not just citizens, but foreigners in the United States. If domestic communications lack significant foreign intelligence information, they must be promptly destroyed. Communications concerning Americans may not be kept more than five years. If a target who was outside the United States enters the country, the monitoring must stop immediately. [/QUOTE]
Insert quotes…
Verification
Post reply
Discussions
Hard Talk
Interviews
New Documents Reveal Parameters Of NSA’s Secret Surveillance Programs
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top